A hierarchical security architecture for cyber-physical systems
暂无分享,去创建一个
[1] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[2] Theodore J. Williams,et al. A Reference Model for Computer Integrated Manufacturing from the Viewpoint of Industrial Automation , 1990 .
[3] T. Başar,et al. Dynamic Noncooperative Game Theory, 2nd Edition , 1998 .
[4] Michael A. Johnson,et al. Supervisory Control and Data Acquisition (SCADA) Systems , 1999 .
[5] Khosrow Moslehi,et al. Power System Control Centers: Past, Present, and Future , 2005, Proceedings of the IEEE.
[6] Lun Li,et al. Cross-layer optimization in TCP/IP networks , 2005, IEEE/ACM Transactions on Networking.
[7] Marija D. Ilic,et al. From Hierarchical to Open Access Electric Power Systems , 2007, Proceedings of the IEEE.
[8] James S. Thorp,et al. Computer Relaying for Power Systems , 2009 .
[9] Quanyan Zhu,et al. Hierarchical Network Formation Games in the Uplink of Multi-Hop Wireless Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[10] David I. Gertman,et al. Resilient control systems: Next generation design research , 2009, 2009 2nd Conference on Human System Interactions.
[11] Kun Ji,et al. Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights , 2010, 2010 3rd International Symposium on Resilient Control Systems.
[12] Samuel Greengard,et al. The new face of war , 2010, Commun. ACM.
[13] Craig G. Rieger. Notional examples and benchmark aspects of a resilient control system , 2010, 2010 3rd International Symposium on Resilient Control Systems.
[14] Mohsen Jafari,et al. An integrated security system of protecting Smart Grid against cyber attacks , 2010, 2010 Innovative Smart Grid Technologies (ISGT).
[15] Khosrow Moslehi,et al. Smart Grid - a reliability perspective , 2010, 2010 Innovative Smart Grid Technologies (ISGT).
[16] Raghunathan Rengaswamy,et al. Achieving resilience in critical infrastructures: A case study for a nuclear power plant cooling loop , 2010, 2010 3rd International Symposium on Resilient Control Systems.
[17] Tamer Basar,et al. Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).
[18] Sourabh Bhattacharya,et al. Differential Game-Theoretic Approach to a Spatial Jamming Problem , 2013 .
[19] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.